A comparative evaluation of three approaches to specifying security requirements MH Diallo, J Romero-Mariona, SE Sim, TA Alspaugh, DJ Richardson 12th Working Conference on Requirements Engineering: Foundation for Software …, 2006 | 67 | 2006 |
Architectural support for trust models in decentralized applications G Suryanarayana, MH Diallo, JR Erenkrantz, RN Taylor Proceedings of the 28th international conference on Software engineering, 52-61, 2006 | 52 | 2006 |
Middleware for pervasive spaces: Balancing privacy and utility D Massaguer, B Hore, MH Diallo, S Mehrotra, N Venkatasubramanian ACM/IFIP/USENIX International Conference on Distributed Systems Platforms …, 2009 | 32 | 2009 |
Cloudprotect: managing data privacy in cloud applications MH Diallo, B Hore, EC Chang, S Mehrotra, N Venkatasubramanian 2012 IEEE Fifth International Conference on Cloud Computing, 303-310, 2012 | 27 | 2012 |
Indexing encrypted documents for supporting efficient keyword search B Hore, EC Chang, MH Diallo, S Mehrotra Workshop on Secure Data Management, 93-110, 2012 | 19 | 2012 |
AutoMigrate: a framework for developing intelligent, self-managing cloud services with maximum availability MH Diallo, M August, R Hallman, M Kline, SM Slayback, C Graves Cluster Computing 20 (3), 1995-2012, 2017 | 18 | 2017 |
Homomorphic Encryption for Secure Computation on Big Data. RA Hallman, MH Diallo, MA August, CT Graves IoTBDS, 340-347, 2018 | 17 | 2018 |
Nomad: A framework for developing mission-critical cloud-based applications MH Diallo, M August, R Hallman, M Kline, H Au, V Beach 2015 10th International Conference on Availability, Reliability and Security …, 2015 | 12 | 2015 |
A generic framework for modeling decentralized reputation-based trust models G Suryanarayana, M Diallo, RN Taylor The fourteenth ACM SigSoft symposium on foundations of software engineering, 2006 | 10 | 2006 |
CallForFire: A Mission-Critical Cloud-Based Application Built Using the Nomad Framework MH Diallo, M August, R Hallman, M Kline, H Au, V Beach International Conference on Financial Cryptography and Data Security, 319-327, 2016 | 9 | 2016 |
The importance of clarity in usable requirements specification formats TA Alspaugh, SE Sim, K Winbladh, M Diallo, H Ziv, DJ Richardson Technical Report UCI-ISR-06-14, Inst. for Softw. Res., Univ. of Cal., Irvine, 2006 | 9 | 2006 |
Architecting trust-enabled peer-to-peer file-sharing applications G Suryanarayana, MH Diallo, JR Erenkrantz, RN Taylor XRDS: Crossroads, The ACM Magazine for Students 12 (4), 5-5, 2006 | 8 | 2006 |
Trustworthy sensing in an untrusted iot environment MH Diallo, N Panwar, S Mehrotra, AA Sani 2018 IEEE International Conference on Pervasive Computing and Communications …, 2018 | 7 | 2018 |
Evaluating software architectures against requirements-level scenarios MH Diallo, L Naslavsky, H Ziv, TA Alspaugh, DJ Richardson Workshop on the Role of Software Architecture for Testing and Analysis, 2007 | 6 | 2007 |
IoT Notary: Sensor data attestation in smart environment N Panwar, S Sharma, G Wang, S Mehrotra, N Venkatasubramanian, ... 2019 IEEE 18th International Symposium on Network Computing and Applications …, 2019 | 5 | 2019 |
System and method for automatically triggering the live migration of cloud services and automatically performing the triggered migration MH Diallo, MA August, ME Kline, SM Slayback, RA Hallman US Patent 10,375,169, 2019 | 4 | 2019 |
Case study, interrupted: The paucity of subject systems that span the requirements-architecture gap MH Diallo, SE Sim, TA Alspaugh Proceedings of the 1st ACM international workshop on Empirical assessment of …, 2007 | 3 | 2007 |
Transitioning from testbeds to ships: an experience study in deploying the TIPPERS Internet of Things platform to the US Navy D Archer, MA August, G Bouloukakis, C Davison, MH Diallo, D Ghosh, ... The Journal of Defense Modeling and Simulation 19 (3), 501-517, 2022 | 2 | 2022 |
IoT Notary: Attestable Sensor Data Capture in IoT Environments N Panwar, S Sharma, G Wang, S Mehrotra, N Venkatasubramanian, ... ACM Transactions on Internet of Things 3 (1), 1-30, 2021 | 2 | 2021 |
Mathematical Model Impact Analysis of a Real-Life Pre-exposure Prophylaxis and Treatment-As-Prevention Study Among Female Sex Workers in Cotonou, Benin L Geidelberg, KM Mitchell, M Alary, A Mboup, L Béhanzin, F Guédou, ... Journal of Acquired Immune Deficiency Syndromes (1999) 86 (2), e28, 2021 | 2 | 2021 |